Security+ PKI Quiz

Security+ PKI Quiz

University

16 Qs

quiz-placeholder

Similar activities

UAS PTIK D 2020 TOPIK KHUSUS MULTIMEDIA

UAS PTIK D 2020 TOPIK KHUSUS MULTIMEDIA

University

20 Qs

Exploring Portfolio Strategies and Analysis

Exploring Portfolio Strategies and Analysis

University

20 Qs

Digital Etiquette

Digital Etiquette

4th Grade - University

15 Qs

LITERACIES in the 21st Century

LITERACIES in the 21st Century

University

20 Qs

Introduction to Software

Introduction to Software

University

20 Qs

Sistem Informasi Manajemen

Sistem Informasi Manajemen

University

20 Qs

BASICS OF DATA COMMUNICATION

BASICS OF DATA COMMUNICATION

University

11 Qs

Pre-Test Pertemuan 5

Pre-Test Pertemuan 5

1st Grade - University

15 Qs

Security+ PKI Quiz

Security+ PKI Quiz

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Kyle Atkins

Used 28+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

Web of Trust

PKI

IaaS

CA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

IKE

CA

PKI

CSP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following certificate formats is used to store a binary representation of a digital certificate?

PFX

DER

P7B

PEM

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital certificate which allows multiple domains to be protected by a single certificate is known as:

Extended Validation (EV) certificate

Wildcard certificate

Subject Alternative Name (SAN) certificate

Root signing certificate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which digital signature type allows multiple subdomains to be protected by a single certificate

Root signing certificate

Subject Alternative Name (SAN) certificate

Extended Validation (EV) certificate

Wildcard certificate

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

"Certificate chaining" refers to a process of verifying the authenticity of a newly received digital certificate. The process involves checking all of the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate's chain is properly issued and valid.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. A recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?